
The security of video conferences depends on two aspects: On the one hand, the software must comply with high security standards. You can find more information on this in the article How does alfaview ensure secure video conferences?. On the other hand, users have to use the software responsibly: What measures can you take yourself to ensure your video conferences are secure?
Preparations
Before your video conference, the focus is on preventing unauthorized access to your alfaview room. You have several security features at your disposal for this purpose.
Define which users have access to which alfaview rooms. Assign access rights and permissions via user management. This allows you to maintain full control over who has which permissions in which rooms.
To invite guests to your alfaview rooms, you can send them personalized invitation links. They can only be used by the person invited and cannot be passed on to others. The links are time-limited so that no guest can enter the room before or after the defined time frame.
If the waiting room is activated, participants and guest have to wait until you allow them to enter your alfaview room. To make sure that no unauthorized persons gain access to your room, you can visit the people in the waiting room and check their identity before actively granting them access to your room.
During the online meeting
As a moderator or admin, you can control who has which permissions within the alfaview room, even during the meeting. Disturbing noises? Revoke the participant’s permission to use the microphone. You can set the same permissions for the camera, screen sharing or the group chat. As a last resort you can remove disruptive participants from the room for 12 hours.
For checking attendance, a simple attendance list or an extensive attendance report are available.
Strictly confidential conversation can be held in alfaview meeting rooms. Meeting rooms do not appear in the room list and cannot be found using the search feature. People in the meeting room cannot be found either.
To protect their privacy, only the participants themselves can set up and turn on their microphone and camera. Additionally, they can blur their surroundings or use a virtual background for more privacy.